Computer Science ›› 2013, Vol. 40 ›› Issue (4): 136-141.
Previous Articles Next Articles
QIAN Zhen-jiang,LU Liang and HUANG Hao
[1] Zhou D.Towards the Formal Modeling of a Secure Operating System [C]∥ Proc.23rd National Information System Security Conference.2000 [2] Liedtke J.On μ-Kernel Construction[C]∥ Proc.15th ACMsymposium on Operating Systems Principles (SOSP’95).1995:237-250 [3] Heiser G,Elphinstone K,Kuz I,et al.Towards trustworthycomputing systems:taking microkernels to the next level [J].ACM SIGOPS Operating Systems Review,2007,41(4):3-11 [4] CMU CS.Mach Project [EB/OL].http://www-2.cs.cmu.edu/afs/cs/project/mach/public/www/mach.html,2011-06-05 [5] Accetta M,Baron R,Bolosky W,et al.Mach:A New KernelFoundation for UNIX Development [J].Computer,1986,39(4864):1-16 [6] L4Group.The L4μ-Kernel Family [EB/OL].http://os.inf.tu-dresden.de/L4/ [7] Elkaduwe D,Klein G,Elphinstone K.Verified Protection Model of the seL4Microkernel [C]∥LNCS 5295.2008:99-114 [8] Klein G,Andronick J,Elphinstone K,et al.seL4:Formal Verification of an Operating-System Kernel [J].Communications of the ACM,2010,53(6):107-115 [9] Smullyan R M.First-Order Logic (Dover Books on Mathema-tics) [M].Mineola:Dover Publications,1995 [10] Stallings W.Operating Systems:Internals and Design Principles [M].New Jersey:Prentice Hall,2004 [11] Bovet D P,Cesati M.Understanding the Linux Kernel (3rd)[M].Sebastopol:O’Reilly,2005 [12] Franke H,Russell R,Kirkwood M.Fuss,futexes and furwocks:Fast Userlevel Locking in Linux [C]∥Proc.Ottawa Linux symposium.2002 |
No related articles found! |
|